Avatar

Labs / SSRF Validator

  • Daily Challenge
  • Released 02 Oct 2025

🌐 Can you trick the server into revealing its own secrets?

A seemingly secure URL validation service stands between you and sensitive internal data! 🔒 The server thinks it's safe behind its firewall, but clever request manipulation might just convince it to fetch data from places it shouldn't. 🕵️ Master the art of server-side request forgery and turn the server against itself! 💥

1
Flags
1
Points
Daily Challenge
Free Access
Start Lab Environment

Launch your dedicated AWS machine to begin hacking

~1-2 min setup
AWS dedicated
Private instance
Industry standard
Daily Challenge

🌐 Server-Side Request Forgery (SSRF) Exploitation

Server-Side Request Forgery (SSRF) is a critical web vulnerability that allows attackers to make requests from the server to internal resources or external systems. This challenge simulates a URL validation service that can be exploited to access restricted internal endpoints.

🎯 What You'll Learn
  • ✓ SSRF attack vectors and techniques
  • ✓ URL parsing and validation bypass methods
  • ✓ Internal network reconnaissance
  • ✓ Protocol manipulation for SSRF exploitation
🔍 Challenge Overview

You'll encounter a web service that validates URLs and fetches their content. The service has security measures in place, but these can be bypassed using various SSRF techniques to access internal resources and retrieve sensitive information.

Security Context: SSRF vulnerabilities are ranked in the OWASP Top 10 and can lead to data exposure, internal network scanning, and potential remote code execution. Understanding these attacks is crucial for both offensive and defensive security.

First Blood 🩸
Malekith